2020 57th ACM/IEEE Design Automation Conference (DAC) 2020
DOI: 10.1109/dac18072.2020.9218662
|View full text |Cite
|
Sign up to set email alerts
|

Developing Privacy-preserving AI Systems: The Lessons learned

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…However, a key disadvantage of this approach is the computational overhead. A recent survey [7] summarizes the various privacy-preserving primitives, such as multi-party computation, differential privacy, and federated learning, that could potentially be integrated into deep learning solutions, emphasizing that almost always a trade-off between security, performance and computational load should be considered.…”
Section: Introductionmentioning
confidence: 99%
“…However, a key disadvantage of this approach is the computational overhead. A recent survey [7] summarizes the various privacy-preserving primitives, such as multi-party computation, differential privacy, and federated learning, that could potentially be integrated into deep learning solutions, emphasizing that almost always a trade-off between security, performance and computational load should be considered.…”
Section: Introductionmentioning
confidence: 99%
“…A recurrent yet motivating example is on medical research, where various hospitals would benefit from each others' patient records to learn how to detect and treat rare diseases [10]. However, current technology is not well prepared for the application of DL on shared data while keeping its privacy [11]. Therefore, it is essential to understand the current knowledge, the failures, and the future research lines in the field of Privacy-Preserving Deep Learning (PPDL).…”
mentioning
confidence: 99%
“…PPCT for DL have attracted the attention of cryptographers and computer scientists in recent years, with an increasing number of proposals published at a fast rate. However, despite the high amount of papers addressing this topic, the technology is still immature, and few actual deployments are being used in privacypreserving scenarios [11,13].…”
mentioning
confidence: 99%
See 1 more Smart Citation